From cc3939470f4459d67fb75652ec07b17a0f1bdaeb Mon Sep 17 00:00:00 2001 From: Tobin Harding Date: Tue, 3 Aug 2021 08:53:47 +1000 Subject: [PATCH] Re-order words Re-order words 'least three Tor nodes relays' -> 'least three Tor relay nodes'. --- 14_1_Verifying_Your_Tor_Setup.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/14_1_Verifying_Your_Tor_Setup.md b/14_1_Verifying_Your_Tor_Setup.md index b1b211b..d4ce2a7 100644 --- a/14_1_Verifying_Your_Tor_Setup.md +++ b/14_1_Verifying_Your_Tor_Setup.md @@ -12,7 +12,7 @@ If you did a standard installation with [Bitcoin Standup](https://github.com/Blo So how does Tor work? -When a user wants to connect to an Internet server, Tor tries to build a path formed by at least three Tor nodes relays, called Guard, Middle, and Exit. While building this path, symmetric encryption keys are negotiated; when a message moves along the path, each relay then strips off its layer of encryption. In this way, the message arrives at the final destination in its original form, and each party only knows the previous and the next hop and cannot determine origin or destination. +When a user wants to connect to an Internet server, Tor tries to build a path formed by at least three Tor relay nodes, called Guard, Middle, and Exit. While building this path, symmetric encryption keys are negotiated; when a message moves along the path, each relay then strips off its layer of encryption. In this way, the message arrives at the final destination in its original form, and each party only knows the previous and the next hop and cannot determine origin or destination. Here's what a connection looks like without Tor: ```